hats-finance / Tapioca-0xe0b920d38a0900af3bab7ff0ca0af554129f54ad

4 stars 4 forks source link

Unchecked return value of transfer functions #31

Open hats-bug-reporter[bot] opened 5 months ago

hats-bug-reporter[bot] commented 5 months ago

Github username: -- Twitter username: -- Submission hash (on-chain): 0xdae446b784acccf3b7cc39e5d44f49cfd6afba0226f93aa6b1f18a6eebc06f37 Severity: medium

Description: Description\ Due to the different ways ERC20s are implemented some return a boolean OR some revert and don't return anything on success

Attack Scenario\ There can be a transaction that uses one of these differences in token return values to create a DOS attack.

Attachments

  1. Proof of Concept (PoC) File https://docs.openzeppelin.com/contracts/5.x/api/token/erc20#SafeERC20

  2. Revised Code File (Optional)

    • Use safeERC20, similar to how safeERC721 is used
0xRektora commented 5 months ago

There's no information about a vulnerability here.